Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,293,715 papers from all fields of science
Search
Sign In
Create Free Account
Code integrity
Code integrity is a measurement used in software testing. It measures the how high is the source code's quality when it is passed on to the QA, and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
1 relation
Software testing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
A measurement study of the subresource integrity mechanism on real-world applications
Ronak Shah
,
Kailas Patil
Int. J. Secur. Networks
2018
Corpus ID: 51867732
Today, billions of websites are available to users in just a click to give them required and appropriate service. Most of these…
Expand
2016
2016
Let's Face It: Faceted Values for Taint Tracking
Daniel Schoepe
,
Musard Balliu
,
Frank Piessens
,
A. Sabelfeld
European Symposium on Research in Computer…
2016
Corpus ID: 37791056
Taint tracking has been successfully deployed in a range of security applications to track data dependencies in hardware and…
Expand
Highly Cited
2013
Highly Cited
2013
Autonomic Recovery: HyperCheck: A Hardware-Assisted Integrity Monitor
Jiang Wang
,
Angelos Stavron
,
Anup K. Ghosh
2013
Corpus ID: 28296276
Abstract : Over the past few years, virtualization has been employed to environments ranging from densely populated cloud…
Expand
2013
2013
SILVER: Fine-Grained and Transparent Protection Domain Primitives in Commodity OS Kernel
Xi Xiong
,
Peng Liu
International Symposium on Recent Advances in…
2013
Corpus ID: 3965696
Untrusted kernel extensions remain one of the major threats to the security of commodity OS kernels. Current containment…
Expand
2008
2008
Attacking , Repairing , and Verifying SecVisor : A Retrospective on the Security of a Hypervisor
Jason Franklin
,
Arvind Seshadri
2008
Corpus ID: 1917017
SecVisor is a hypervisor designed to guarantee that only code approved by the user of a system executes at the privilege level of…
Expand
2008
2008
Mechanisms to Provide Integrity in SCADA and PCS devices ∗
Aakash Shah
,
A. Perrig
,
B. Sinopoli
2008
Corpus ID: 14485275
Supervisory Control and Data Acquisition (SCADA) systems control and monitor critical infrastructure such as natura l gas, oil…
Expand
2007
2007
Agile enterprise software development using domain-driven design and test first
E. Landre
,
Harald Wesenberg
,
Jorn Olmheim
Conference on Object-Oriented Programming Systems…
2007
Corpus ID: 2733549
In this paper we present the experience gained and lessons learned when the IT department at Statoil ASA, a large Oil and Gas…
Expand
2006
2006
Data and code integrity in Grid environments
R. Akimana
,
O. Markowitch
2006
Corpus ID: 13953596
In a large distributed system such as the Grid, ensuring data integrity is of particular importance. Since in a same network…
Expand
2005
2005
Hardware support for code integrity in embedded processors
M. Milenkovic
,
A. Milenković
,
E. Jovanov
International Conference on Compilers…
2005
Corpus ID: 2956777
Computer security becomes increasingly important with continual growth of the number of interconnected computing platforms…
Expand
Review
1998
Review
1998
Security concepts and implementation in the Ara mobile agent system
H. Peine
Proceedings Seventh IEEE International Workshop…
1998
Corpus ID: 7454544
We describe the security architecture of the Ara mobile agent platform, after reviewing the relevant aspects of comparable…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE